ICS : Infiltration of Malware via Removable Media and External Hardware
Common Malware scenarios – Infected USB flash drives, Notebook computers used for maintenance, Project files or executable applications containing malicious code. What are the best practices to handle these incidents?